|
Volumn , Issue , 2007, Pages
|
Verified enforcement of security policies for cross-domain information flows
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CASE STUDIES;
COLLABORATIVE PLANNING;
CROSS DOMAIN;
INFORMATION FLOWS;
LANGUAGES (TRADITIONAL);
NETWORKED APPLICATIONS;
PROGRAM ANALYSIS;
SECURITY LABELS;
SECURITY POLICIES;
SECURITY REQUIREMENTS;
SENSITIVE DATA;
WORK-IN-PROGRESS (WIP);
COMPUTER PROGRAMMING LANGUAGES;
COMPUTER SOFTWARE;
LABELING;
LABELS;
LINGUISTICS;
MILITARY COMMUNICATIONS;
MILITARY OPERATIONS;
QUERY LANGUAGES;
SECURITY SYSTEMS;
SECURITY OF DATA;
|
EID: 47949111299
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/MILCOM.2007.4455189 Document Type: Conference Paper |
Times cited : (6)
|
References (8)
|